{"id":16557,"date":"2021-07-07T12:45:42","date_gmt":"2021-07-07T10:45:42","guid":{"rendered":"https:\/\/herolab-usd.formwandler.rocks\/security-advisories\/usd-2018-0017\/"},"modified":"2021-07-19T14:08:17","modified_gmt":"2021-07-19T12:08:17","slug":"usd-2018-0017","status":"publish","type":"page","link":"https:\/\/herolab.usd.de\/en\/security-advisories\/usd-2018-0017\/","title":{"rendered":"usd-2018-0017"},"content":{"rendered":"<p>[et_pb_section fb_built=\"1\" _builder_version=\"4.9.4\" _module_preset=\"default\" background_color=\"#2E353D\" custom_padding=\"||0px|||\"][et_pb_row _builder_version=\"4.9.4\" _module_preset=\"default\"][et_pb_column type=\"4_4\" _builder_version=\"4.9.4\" _module_preset=\"default\"][et_pb_text _builder_version=\"4.9.4\" _module_preset=\"cc5ac6f4-ebbd-4b3f-bc92-4dfc1f15fe2c\" hover_enabled=\"0\" sticky_enabled=\"0\"]<\/p>\n<h1 class=\"h-custom-headline usd-small-letters h2\"><span>usd-2018-0017 | Lexware Professional 2017\/17.02<\/span><\/h1>\n<p><span><\/span><br \/><strong>Advisory ID<\/strong><span>: usd-2018-0017<\/span><br \/><strong>CVE Number<\/strong><span>: N\/A<\/span><br \/><strong>Affected Product<\/strong><span>: Lexware Professional 2017<\/span><br \/><strong>Affected Version<\/strong><span>: 17.02<\/span><br \/><strong>Vulnerability Type<\/strong><span>: Broken Authentication<\/span><br \/><strong>Security Risk<\/strong><span>: Critical<\/span><br \/><strong>Vendor URLL<\/strong><span>: <\/span><a href=\"https:\/\/shop.lexware.de\/reisekosten-abrechnung\" target=\"_blank\" rel=\"noopener\">https:\/\/shop.lexware.de\/reisekosten-abrechnung<\/a><br \/><strong>Vendor Status<\/strong><span>: Fixed<\/span><\/p>\n<h3><\/h3>\n<h3>Description<\/h3>\n<p>Access control enforces policy such that users cannot act outside of their intended permissions. Failures typically lead to unauthorized information disclosure, modification or destruction of all data, or performing a business function outside of the limits of the user.<\/p>\n<p>The vulnerability that merits mention, is the hardcoded encryption\/decryption key used in the Lexware client. At a glance, the process setup works by encrypting the user delivered password by the client and delivering the same to the database and the decrypting works vice-versa, wherein encrypted password is fetched from the database and decrypted by the Lexware client. Even though this might appear a sound process on a first look, the presence of decrypting algorithm implies an alternate method to obtain user passwords. A simplified option would be to use the client\u2019s decryption feature to do the work.<\/p>\n<p>For example, in the user management options, the decrypted password is hidden by the client with a dot option. This highly simplified method can be easily bypassed with existing tools.<\/p>\n<p><span><\/span><\/p>\n<h3>Proof of Concept\u00a0<\/h3>\n<p><span>A sample screenshot is provided to enhance the ease of understanding. It shows the decrypted administrator password.<\/span><\/p>\n<p>[\/et_pb_text][et_pb_image src=\"https:\/\/herolab.usd.de\/wp-content\/uploads\/sites\/9\/2021\/07\/lexware_hardcoded_key_screenshot.png\" title_text=\"lexware_hardcoded_key_screenshot\" _builder_version=\"4.9.4\" _module_preset=\"default\" custom_margin=\"27px||43px||false|false\" hover_enabled=\"0\" sticky_enabled=\"0\"][\/et_pb_image][et_pb_text _builder_version=\"4.9.4\" _module_preset=\"cc5ac6f4-ebbd-4b3f-bc92-4dfc1f15fe2c\" hover_enabled=\"0\" sticky_enabled=\"0\"]<\/p>\n<div class=\"e16902-22 x-container max width\">\n<div class=\"e16902-23 x-column x-sm x-1-1\">\n<h3>Fix<\/h3>\n<p><a href=\"https:\/\/cheatsheetseries.owasp.org\/cheatsheets\/Access_Control_Cheat_Sheet.html\" target=\"_blank\" rel=\"noopener\">https:\/\/cheatsheetseries.owasp.org\/cheatsheets\/Access_Control_Cheat_Sheet.html<\/a><\/p>\n<p><a href=\"https:\/\/cheatsheetseries.owasp.org\/cheatsheets\/Key_Management_Cheat_Sheet.html\" target=\"_blank\" rel=\"noopener\">https:\/\/cheatsheetseries.owasp.org\/cheatsheets\/Key_Management_Cheat_Sheet.html<\/a><\/p>\n<p>&nbsp;<\/p>\n<h3>Credits<\/h3>\n<p><span>This security vulnerabilities were found by Brenda Anthony and Sebastian Puttkammer of usd AG.<\/span><\/p>\n<\/div>\n<\/div>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section]<\/p>\n","protected":false},"excerpt":{"rendered":"<p>usd-2018-0017 | Lexware Professional 2017\/17.02 Advisory ID: usd-2018-0017CVE Number: N\/AAffected Product: Lexware Professional 2017Affected Version: 17.02Vulnerability Type: Broken AuthenticationSecurity Risk: CriticalVendor URLL: https:\/\/shop.lexware.de\/reisekosten-abrechnungVendor Status: Fixed Description Access control enforces policy such that users cannot act outside of their intended permissions. Failures typically lead to unauthorized information disclosure, modification or destruction of all data, or performing [&hellip;]<\/p>\n","protected":false},"author":96,"featured_media":0,"parent":16124,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_et_pb_use_builder":"on","_et_pb_old_content":"","_et_gb_content_width":"","inline_featured_image":false,"footnotes":""},"class_list":["post-16557","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/herolab.usd.de\/en\/wp-json\/wp\/v2\/pages\/16557","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/herolab.usd.de\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/herolab.usd.de\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/herolab.usd.de\/en\/wp-json\/wp\/v2\/users\/96"}],"replies":[{"embeddable":true,"href":"https:\/\/herolab.usd.de\/en\/wp-json\/wp\/v2\/comments?post=16557"}],"version-history":[{"count":0,"href":"https:\/\/herolab.usd.de\/en\/wp-json\/wp\/v2\/pages\/16557\/revisions"}],"up":[{"embeddable":true,"href":"https:\/\/herolab.usd.de\/en\/wp-json\/wp\/v2\/pages\/16124"}],"wp:attachment":[{"href":"https:\/\/herolab.usd.de\/en\/wp-json\/wp\/v2\/media?parent=16557"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}